Jobs
Interviews

234 Ethical Hacking Jobs - Page 8

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 7.0 years

6 - 10 Lacs

Mumbai

Work from Office

? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails

Posted 3 months ago

Apply

11.0 - 16.0 years

10 - 15 Lacs

Pune

Work from Office

Education Criteria (Must): B.Sc (IT/CS) / B.Tech in any Engineering background, BCA, MCA M.Sc. Information Technology, or related field. CEH, CISSP, CISA, CISM, CRISC (If any security related certification) 11-15 years of experience in Application Security, Network Security, and IT Risk Compliance, with hands-on expertise in security assessments, process audits, and application reviews. Experience in BFSI is preferred. Lead and manage the AppSec team consisting of L1 and L2 resources. Serve as the primary point of contact between the Client and the team for all project-related activities. Monitor daily operations, ensure resource optimization, and address any issues that arise during the engagement. Application Security Review - Oversee the review of application security including web, mobile, API, and other banking applications. Perform comprehensive reviews of Network Architecture, Source Code, VAPT reports, and configuration audits. Review deliverables from L1 and L2 resources, ensuring completeness and quality. Compliance and Risk Management Reporting Stakeholder Management Skill-Vulnerability Assessment, Manual Penetration Testing using OWASP checklists, Penetration Testing, OWASP Top 10, OWASP ZAP, Ethical Hacking, Static/dynamic testing of mobile applications, Vulnerability Mitigation.

Posted 3 months ago

Apply

3.0 - 6.0 years

5 - 9 Lacs

Pune

Work from Office

Static Code analysis Static/dynamic testing of mobile applications Vulnerability Assessment Penetration Testing. SAST Penetration testing Vulnerability Assessment

Posted 3 months ago

Apply

3.0 - 5.0 years

15 - 25 Lacs

Bengaluru

Work from Office

Company Overview: Outsourced is a leading ISO certified India & Philippines offshore outsourcing company that provides dedicated remote staff to some of the world's leading international companies. Outsourced is recognized as one of the Best Places to Work and has achieved Great Place to Work Certification. We are committed to providing a positive and supportive work environment where all staff can thrive. As an Outsourced staff member, you will enjoy a fun and friendly working environment, competitive salaries, opportunities for growth and development, work-life balance, and the chance to share your passion with a team of over 1000 talented professionals. About the Role: Conduct web app, external, and internal penetration tests for global clients. Deliver high-quality reports and communicate findings to stakeholders. Work autonomously in a client-facing role with minimal supervision. Work Setup Location: Onsite - Bangalore Core hours: ~10 AM7 PM IST (but we're flexible) Key Responsibilities: Conduct full-scope penetration tests : Web apps (modern JS frameworks, APIs, microservices) External/internal networks (pivoting, privilege escalation) Cloud environments (AWS/Azure/GCP misconfigurations) Develop custom exploits for unique vulnerabilities (not just CVEs) Reverse engineer black-box systems when documentation is limited Client & Reporting: Translate technical findings into executive-level risk briefings Deliver actionable reports (we hate template spam) Guide clients through remediation validation Team Contribution: Mentor junior team members (optional but encouraged) Contribute to internal tool development (if interested) Participate in quarterly research sprints (choose your focus area) Requirements: OSCP-certified (must have current certification) 3-5 years of hands-on pen testing experience (not just vulnerability scanning) Can walk us through your methodology for: Web app testing (Burp Suite, custom exploits) Internal network pivoting Cloud environment testing (AWS/Azure/GCP) Communication chops – you'll be explaining XSS to CTOs Nice-to-Haves (Tell Us If You Have These): OSCE/OSEP/CREST certifications Cloud security certs (AWS/Azure/GCP) Published CVEs/blog posts/research Experience with red team operations What we Offer Health Insurance: We provide medical coverage up to 20 lakh per annum, which covers you, your spouse, and a set of parents. This is available after one month of successful engagement. Professional Development: You'll have access to a monthly upskill allowance of 5000 for continued education and certifications to support your career growth. Leave Policy: Vacation Leave (VL): 10 days per year, available after probation. You can carry over or encash up to 5 unused days. Casual Leave (CL): 8 days per year for personal needs or emergencies, available from day one. Sick Leave: 12 days per year, available after probation. Flexible Work Hours Outsourced Benefits such as Paternity Leave, Maternity Leave, etc.

Posted 3 months ago

Apply

5.0 - 10.0 years

0 - 2 Lacs

Chennai

Hybrid

OSCP Certification is needed. Need to have solid hands-on experience with at least 3 of these , and a basic understanding of the rest -- Mac and/or Windows Thick Client Web Application & API & AI Mobile (Android and/or iOS) & IoT Infrastructure/Systems Network/Firewalls/Switches Competencies - 5+ years of penetration testing or related security experience. Network penetration testing and manipulation of network infrastructure. Web, mobile, and/or desktop application assessments. Social engineering assessments (email, phone, or physical). Automation or scripting using Perl, Python, Ruby, or similar languages. Exploit development or modifying shellcode and existing exploit tools. Application development in C#, ASP.NET, Objective C, or Java (J2EE). Reverse engineering malware, data obfuscation, or cryptographic systems. Regulatory penetration testing, particularly focusing on FTC and PCI compliance standards. Source code review for control flow and security vulnerabilities. Strong knowledge of operating systems and network protocols. Proficiency with tools such as Burp Suite, Checkmarx, Snyk, Wireshark, Fiddler, and Wiz. Ethical approach to security and business operations. Fluency in written and spoken English (B2 level or higher). Familiarity with Kali Linux and security frameworks like MITRE ATT&CK. Desire to continuously learn new techniques and attack vectors. Preferred Skills: Experience with wireless, web application, and network security testing tools. Familiarity with ICS, SCADA, BACnet protocols, and covert communication channels. Basic understanding of AI and machine learning security, including adversarial attacks, model poisoning and secure deployment of AI systems. Working knowledge of Unix/Linux/Mac/Windows operating systems, including scripting in Bash and Powershell. Experience with security controls in AWS, GCP, and Azure cloud environments. Understanding of security principles like defense-in-depth and security architectures. Experience in guiding and mentoring junior team members, with a focus on developing technical skills and expertise. Industry certifications like OSCP, OSWP, GPEN, GWAPT, OSCE, OSEE, GXPN, CEH or equivalent are highly desirable.

Posted 3 months ago

Apply

6.0 - 9.0 years

2 - 6 Lacs

Gurugram

Work from Office

This role involves the development and application of engineering practice and knowledge in designing, managing and improving the processes for Industrial operations, including procurement, supply chain and facilities engineering and maintenance of the facilities. Project and change management of industrial transformations are also included in this role. - Grade Specific Focus on Industrial Operations Engineering. Develops competency in own area of expertise. Shares expertise and provides guidance and support to others. Interprets clients needs. Completes own role independently or with minimum supervision. Identifies problems and relevant issues in straight forward situations and generates solutions. Contributes in teamwork and interacts with customers. Skills (competencies)

Posted 3 months ago

Apply

12.0 - 15.0 years

55 - 60 Lacs

Ahmedabad, Chennai, Bengaluru

Work from Office

Dear Candidate, We are hiring a Digital Forensics Analyst to investigate cyber incidents, recover digital evidence, and support legal and compliance teams. Ideal for professionals with a strong background in cybersecurity and forensic analysis. Key Responsibilities: Perform forensic imaging and analysis on digital devices Investigate incidents involving malware, breaches, or data leaks Document evidence for regulatory, legal, or HR use Collaborate with SOC and legal teams to support investigations Required Skills & Qualifications: Experience with forensic tools (EnCase, FTK, Autopsy, X-Ways) Knowledge of file systems, OS internals, and memory analysis Understanding of chain-of-custody and evidence handling Bonus: GIAC (GCFA, GCFE) or related digital forensics certifications Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 3 months ago

Apply

3.0 - 8.0 years

3 - 6 Lacs

Kolkata

Work from Office

We are looking for a CEH V11 Trainer who can work with us on a full time basis. A Trainer who can deliver and lead basic and advanced Cyber Security trainings (Technical trainings) for various programs and collaborate with management to identify training needs of Government institutions, Universities and corporates. Job Role : Can take training for Students Corporate. Develop retain an up-to-date knowledge of current working practice. Be able to deliver high-quality virtual in-person technical training in line with industry-recognized Have best practices on Cyber Security Ethical Hacking Must be from B.Tech/BCA Background Should be CEH V11 CHFI V10 Certified. (CHFI V10 is preferred) Should have good communication presentation skills Should have 0 - 3 years experience in IT Security domain. Salary- On the Table CEH V11 CHFI V10 Certified. (CHFI V10 is preferred)

Posted 3 months ago

Apply

3.0 - 5.0 years

7 - 12 Lacs

Noida

Work from Office

At CGM, the leading provider of software solutions in the healthcare sector, we are looking for a skilled Ethical Hacker (m/f/d) to join our growing cybersecurity team. We believe in innovation, teamwork, and the power of technology to drive change. With our vision that "No one should suffer or die because at some point medical information was missing", we aim to create a culture that contributes positively to the future of our healthcare system. You are a proactive problem-solver with a passion for cybersecurity and the desire to make a real difference! Join us on this exciting journey! Your contribution: Conduct penetration testing on applications, networks, and systems to identify vulnerabilities and provide actionable recommendations for improvement. Simulate real-world attacks and collaborate with IT and security teams to develop effective remediation strategies. Prepare detailed reports of findings, including risk assessments, and conduct security awareness training for staff to promote a culture of cybersecurity. Stay updated on the latest security threats and participate in incident response activities and forensic analysis in the event of a security breach. Maintain compliance with security policies, legal regulations, and industry best practices to ensure a robust cybersecurity framework.\ What you bring: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field, along with proven experience as an ethical hacker (m/f/d) or penetration tester (m/f/d) (HackerOne or Integrity Score preferred) Relevant certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information System Security Professional (CISSP) Proficiency in security testing tools (e.g. Metasploit, Wireshark, Burp Suite, Nmap) and strong knowledge of networking protocols, operating systems, and web applications. Experience with thick client penetration testing, along with programming or scripting skills (e.g. Python, Java, Bash) as an advantage Willingness to train and obtain certification in cloud penetration testing, combined with excellent analytical, problem-solving, and communication skills (German and English) to convey technical information to non-technical audiences What you can expect: Mobile Work: Work flexibly two days a week remotely and three days on-site. Attractive locations: Our offices feature fully equipped workspaces completed by regular events, including summer gatherings and Christmas parties. Health: We value health highly. Our in-house cafeteria offers a selection of delicious and healthy meals every day. Personal Development: Our in-house academy and portfolio of external partners support your professional growth. Diversity is part of CGM! We welcome your application regardless of disability, gender, nationality, ethnic and social origin, religion, age or sexual orientation and identity. Convinced? Apply now with your comprehensive documents (including your certificates, salary expectations, and earliest possible start date).

Posted 3 months ago

Apply

0.0 - 5.0 years

5 - 9 Lacs

Pune

Work from Office

Responsibilities: Monitor systems, respond to incidents. Collaborate with teams on threat management strategies. Manage access control & encryption. Maintain compliance standards. Conduct regular security assessments. Office cab/shuttle Food allowance Health insurance Provident fund

Posted 3 months ago

Apply

5.0 - 10.0 years

12 - 17 Lacs

Mumbai

Work from Office

i. BE/B. TECH/BCA/B.SC/M.SC/MCA/M. Tech-(Computers/Electronics/IT) ii. Minimum one certification such as CEH/CPTC/OSCP/ECSA/CEPT and/or equivalent. iii. Having at least 5+ years of post-qualification relevant work experience including appearance before court of law while presenting the extracted cyber evidence. iv. Experience of managing large scale digital evidence media. v. Comprehensive knowledge on forensic digital device data preservation, acquisition, analysis and documentation. vi. Experience in-depth practical knowledge on Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations. vii. Experience in handling real-life cyber- crime cases would be preferred. viii. Experience in investigation on Web Defacement/Site Down activities ix. Experience in investigation of Email and VOIP call Analysis and trace Down Methods. x. Experience in investigation on Web SMS/Image/Reverse Image/Video Source tracing methods. xi. Experience in practical knowledge multiple enterprise and open source which have industry benchmark. xii. Experience in comprehensive knowledge on System, Mobile Forensics, Internet Forensics, Cloud Forensics, CC Footage/AV Forensics, Database Forensics, Network Forensics, Malware Forensics, Stegano and Crypto Forensics, Memory Forensics, UAV Forensics and /or other variety of Forensic formats. xiii. Experience in-depth practical knowledge on Malware Forensics, Memory Analysis, Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations, Advanced persistent threats (APTs), Sophisticated analysis of malware, cyber security incident (Packet tracing, Web Logs, taking a copy of the mail store and aggregated log analysis), performing threat modeling, and producing intelligence threat assessments. xiv. Experience in practical knowledge on multiple enterprise, open-source tools, Static and Dynamic Malware Analysis Tools. xv. Experience in generating forensic documents for case investigation. xvi. Graduation from premier institutes (IITs, NITs, NFSL, IIIT, etc.) shall be preferred. xvii. Bug-bounty program winners will be preferred. .

Posted 3 months ago

Apply

1.0 - 6.0 years

6 - 12 Lacs

Greater Noida

Work from Office

Designation: Cybersecurity Trainer Job Purpose & Role: To design, develop, and deliver advanced training programs in secure coding, reverse engineering, and malware analysis . Technical knowledge and hands-on experience in secure coding, system-level programming, and threat analysis is highly preferred. A. Knowledge Proven experience as a trainer or instructor in cybersecurity. Expertise in Assembly language, C/C++, and secure system programming. Proficiency in reverse engineering tools such as IDA Pro, Ghidra, and Process Explorer. Solid understanding of PE file formats, static and dynamic code analysis techniques. Experience with Python scripting for automation and cybersecurity use cases. B. Functional Skills Develop and deliver training modules in: Computer Architecture and Assembly Language Secure Coding Practices Reverse Engineering and Malware Analysis Advanced C++ Development Python for Security Automation (optional/elective) Conduct assessment and certification exams to evaluate participant learning outcomes. C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience Certifications such as GREM, OSCE, OSCP, or CEI (Certified EC-Council Instructor). ME/M.Tech and BE/B.Tech in Computer Science /Information Technology Cybersecurity or related field reputed university & Institute of eminence. PhD Degree in the relevant field of subject is desirable. Industry and Global Experience is desirable. E. Salary as per norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our website’s career page at www.glbitm.ac.in

Posted 3 months ago

Apply

0.0 - 5.0 years

6 - 16 Lacs

Greater Noida

Work from Office

ABOUT JOB Designation: Cybersecurity Trainer Job Purpose : Proven experience in cybersecurity concepts, hands-on experience with tools and techniques across the security domain, and relevant industry certifications. You will be responsible for training students as per a structured semester-based roadmap that includes areas like ethical hacking, digital forensics, malware analysis, penetration testing, and more. A. Knowledge Strong understanding of security principles and best practices. Hands-on experience with tools and platforms used in SOC, VAPT, forensic analysis, and exploit development. Passion for teaching and mentoring. B. Functional Skills Deliver high-quality training in the following areas: Network Defense and Python Programming Ethical Hacking, Intrusion Detection, and Prevention Vulnerability Assessment and Penetration Testing (VAPT) Digital Forensics, Governance Risk and Compliance (GRC), Reverse Engineering Cyber Threat Intelligence (CTI), Exploit Development, OSINT Develop course content, lab exercises, and assessments aligned with semester-wise skill development. Train and mentor students on real-world scenarios and tools (e.g., Wireshark, Metasploit, Burp Suite, Splunk). C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience ME/M.Tech and BE/B.Tech in Computer Science /Information Technology from reputed university & Institute of eminence PhD Degree in the relevant field of subject is desirable. Industry and Global Experience is desirable. Certifications (Any of the following required) CEH (Certified Ethical Hacker) CompTIA Security+ / CySA+ OSCP (Offensive Security Certified Professional) CHFI (Computer Hacking Forensic Investigator) CISA/CISM (Certified Information Systems Auditor / Manager) CPT / CVAPT (Certified Penetration Tester / Certified VAPT Professional) GIAC Certifications (GSEC, GCIA, GREM etc.) E. Salary as per norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our websites career page at www.glbitm.ac.in

Posted 3 months ago

Apply

4.0 - 5.0 years

6 - 7 Lacs

Tamil Nadu

Work from Office

Perform security testing on applications using Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) tools to identify vulnerabilities and recommend mitigations.

Posted 3 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Mumbai

Work from Office

The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.

Posted 3 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Chennai

Work from Office

The Cyber Security E2 role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security E2 domain.

Posted 3 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Hyderabad

Work from Office

The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.

Posted 3 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Bengaluru

Work from Office

The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.

Posted 3 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Bengaluru

Work from Office

The Pen Testers role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Pen Testers domain.

Posted 3 months ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Chennai

Work from Office

The Penetration Testing role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Penetration Testing domain.

Posted 3 months ago

Apply

5.0 - 8.0 years

10 - 14 Lacs

Hyderabad

Work from Office

Project Role : Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : SAP Security Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Lead, you will lead the effort to design, build, and configure applications, acting as the primary point of contact. Your typical day will involve collaborating with various teams to ensure that application requirements are met, overseeing the development process, and providing guidance to team members. You will also engage in problem-solving activities, ensuring that the applications are aligned with business objectives and user needs, while maintaining a focus on quality and efficiency throughout the project lifecycle. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate knowledge sharing and training sessions to enhance team capabilities.- Monitor project progress and implement necessary adjustments to meet deadlines. Professional & Technical Skills: - Must To Have Skills: Proficiency in SAP Security.- Good To Have Skills: Experience with identity and access management solutions.- Strong understanding of application security best practices.- Experience in configuring and managing user roles and authorizations.- Familiarity with compliance standards related to data security. Additional Information:- The candidate should have minimum 7.5 years of experience in SAP Security.- This position is based at our Hyderabad office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 months ago

Apply

10.0 - 17.0 years

27 - 30 Lacs

Ahmedabad

Work from Office

Department: Information Technology Location: Ahmedabad, Gujarat Experience: 10+ Years Education: Bachelors/Masters degree in Computer Science, Cybersecurity, or a related field Certifications Preferred: OSCP, OSCE, OSEP, CRTP, CRTE, GPEN, GXPN, or equivalent Job Summary: We are seeking a highly experienced and skilled Red Team Specialist to join our cybersecurity team. The ideal candidate will lead advanced adversary simulations and penetration testing efforts to evaluate and strengthen the organization’s security posture. This role involves simulating real-world attack scenarios, identifying vulnerabilities, collaborating with Blue Teams, and recommending remediation strategies to enhance threat detection and response capabilities. Key Responsibilities: Adversary Simulation & Attack Execution Conduct full-scale Red Team assessments, emulating advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). Simulate real-world attacks using frameworks and tools like MITRE ATT&CK, Cobalt Strike, Empire, Metasploit, and BloodHound. Exploit vulnerabilities across network infrastructure, cloud platforms, and web applications. Perform lateral movement, privilege escalation, and data exfiltration while evading detection mechanisms. Penetration Testing & Exploitation Perform internal and external penetration testing across enterprise systems. Identify and exploit misconfigurations and security gaps. Assess Active Directory security, including Kerberoasting, NTLM relay, and credential dumping. Develop custom payloads, exploits, and offensive methodologies. Evasion & Anti-Detection Techniques Employ techniques to bypass endpoint detection systems (EDR/XDR), SIEM tools, and behavioral analytics. Test the resilience of Blue Team monitoring capabilities. Implement obfuscation strategies and evasion tactics. Red Team & Blue Team Collaboration Participate in Purple Team exercises to enhance incident detection and response. Collaborate with SOC and threat intelligence teams to refine adversary emulation and response strategies. Contribute to improving incident response playbooks. Reporting & Documentation Document attack chains, vulnerabilities, and testing outcomes in detailed reports. Present technical findings and remediation recommendations to stakeholders. Create post-engagement reports, including MITRE ATT&CK mapping and kill chain analysis. Key Skills & Competencies: Proficient with offensive security tools: Cobalt Strike, Metasploit, Mimikatz, Empire, Covenant Deep understanding of frameworks: MITRE ATT&CK, Cyber Kill Chain, TIBER-EU Advanced expertise in Active Directory attacks , Kerberos exploitation , and lateral movement Strong scripting and automation skills: Python, PowerShell, Bash, C# Hands-on experience with cloud environments (Azure, AWS, GCP) and cloud exploitation Skilled in EDR/XDR evasion and SIEM bypass techniques Proven experience with Red Team / Blue Team collaboration and adversary emulation Analytical mindset with excellent problem-solving and documentation skills

Posted 3 months ago

Apply

4.0 - 6.0 years

11 - 16 Lacs

Bengaluru

Work from Office

Volvo India is looking for Senior IT Security Officer to join our dynamic team and embark on a rewarding career journey. Ensure the security, safety and well-being of all personnel, visitors and the premises Provide excellent customer service Adhere to all company service and operating standards Remain in compliance with local, state and federal regulations Immediately respond to emergencies to provide necessary assistance to employees and customers Protect the companys assets relative to theft, assault, fire and other safety issues Follow procedures for various initiatives, including fire prevention, property patrol, traffic control and accident investigations

Posted 3 months ago

Apply

5.0 - 10.0 years

15 - 18 Lacs

Bhiwadi

Work from Office

Dear Friends, We have excellent opening for Cyber Security Consultant to Lead our Organisations Security strategy and ensure the Protection of Digital assets network and Data. Manage and oversee security infrastructure, including firewalls, IDS/IPS Required Candidate profile Bachelor degree in Cybersecurity, information Technology, or related field 5-10 yrs of experiences in Cybersecurity Strong knowldge of security frameworks Certifications such CISSP, CISM CEH

Posted 3 months ago

Apply

3.0 - 6.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Performing critical operations on our Development and Production environments to meet Security and Compliance requirements. Maintaining Security and Compliance by monitoring, scanning, configuring, and patching a vast variety of cloud devices including various Windows and Linux OS systems, VMs, VMware ESXi, K8s nodes/clusters, cloud storage, and networking devices. Maintaining tooling and automation for managing security and compliance process for our internal and client environments. Deploying new architecture, devices, and automation for Security needs. Managing access and change controls for our development and production environments. Maintaining logging, performing analysis, and compiling evidence for Securityand Compliance reviews of our environments. The role is very important in our ability to deliver valuable automated and integrated solutions as a premier offering in IBM Cloud. With this, we have an extremely high demand for meeting the most stringent Security and Compliance standards. In our fast-paced and expanding organization, we foster an environment of continuous innovation and working in agile teams, to deliver the latest technology and provide excellent support to our clients. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 8+ years of Overall experience as Security/Compliance Engineer. 3+ years of experience with system automation, scripting, and development 1+ years of experience with Linux system administration or development 1+ years of experience with Windows system administration or development 1+ years of experience with secure engineering practices and standards 1+ years of experience with software engineering and testing 1+ years of experience with Python Strong communication skills in English Preferred technical and professional experience 1+ years of experience with IBM SOS process and tooling, e.g. Nessus, QRadar, Uptycs, CrowdStrike, etc. 1+ years of experience with Windows Active Directory administration or development 1+ years of experience with Microsoft Windows Update or Group Policy Objects (GPO) 1+ years of experience with Access Control with IBM AccessHub 1+ years of experience with ServiceNow, e.g. for Change Management 1+ years of experience with GitHub issue and code management 1+ years of experience with IBM Cloud Risk Management process 1+ years of experience with IBM PSIRT process 1+ years of experience with data privacy and handling 1+ years of experience with ethical hacking and Pentesting 1+ years of experience with Jenkins build and platforms 1+ years of experience with networking, and network security components, firewalls, gateways 1+ years of experience with security standards, authentication, authorization, and encryption protocols 1+ years of experience with VMware administration 1+ years of experience with VMware API integration development 1+ years of experience with IBM Cloud API integration development Experience with Compliance needs across Industry verticals - ISO 27001, SOC2, PCI, HIPAA, etc.

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies